Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


04:00 PM
Connect Directly

Securing OS X: Apple, Security Vendors Need To Up Their Game

To date, OS X malware is pretty lame, but it's easy to write better malware to bypass current defenses, security researcher Patrick Wardle told a Black Hat audience last week.

BLACK HAT USA -- Las Vegas -- The current class of malware designed to infect Apple’s OS X operating system, “while sufficient, is inelegant, amateur, and trivial to detect and prevent,” according to Patrick Wardle, director of research and development with security firm Synack.

The problem is Apple and third party security companies are using the existing OS X malware to validate their tools. Yet, it is very easy to write even better malware to bypass current defenses for OS-X-based Mac computers, Wardle said. And, if he can do it, so can nation-states or malicious attackers.

So Wardle used his presentation, “Writing Bad @$$ Malware for OS X,” at the Black Hat conference last week as a wake-up call and a forum to demonstrate how to write better malware and to present some free security tools that can help prevent more advanced malware infections.

Mac computers are prevalent in the home and enterprise. In March, Apple officials reported that Mac notebook sales have grown 21 percent over the last year, while total industry sales have fallen.  Yet, Apple has claimed that Mac isn’t susceptible to the thousands of viruses plaguing Windows-based computers, Wardle noted.

In fact, the ‘first’ virus, Elk Cloner, infected Apple II computers. Over the last five years, 50 new OS X malware families have emerged. And, in 2014, there were nearly 1,000 unique attacks on Mac computers, according to Kaspersky Labs.

Using several recent OS X malware as examples -- OSX/XSLCMD, OSX/WIRELURKER (an iOS infector via USB) and OSX/CRISIS – Wardle drew some general observations about the current state of OS X malware.

In terms of infection, most use Trojans, meaning they require user interaction.  Some use phishing, but the exploits they deliver are older or already patched.  “So, security conscious users who keep their computers updated and email, probably will be fine,” Wardle said.

In terms of persistence, the malware use well-known techniques. The majority employ launch items that are easy to uncover, detect and prevent.  In terms of self-defense, there is minimal obfuscation and the malware is easy to detect and remove. From a stealth perspective, most 'hide' in plain sight and are stand-alone executables.   

“Features is one area that current OS X malware is sufficient, it gets the job done,” Wardle said. “But if you look closer at how these features are implemented, a lot of times it’s done in an amateur, inelegant way.” Finally, the malware does not have the ability to bypass personal firewalls and anti-virus software.

“The grade I would like to give current OS X malware is a C+.  It is sufficient, but inelegant, amateur, and trivial to detect and prevent,” Wardle said.  “So, my goal is to spur discussions to make better security tools so we can ultimately secure our Macs.

Apple has introduced security enhancements to thwart malware such as XProtect, a built-in anti-virus solution; Gatekeeper, which verifies downloaded software; sandboxing, which prevents Mac Store applications from accessing OS-level components; and signed-code requirements, which only allows signed kernel extensions to be loaded. 

Wardle demonstrated how many of these capabilities, although steps in the right direction, could be circumvented. For example, binary infection is an old school, but colorful attack mechanism, which is stealthy and hard to remove. Here an attacker would inject viral code into OS X binaries, effectively shutting down any other processes or files from running in the file system. 

Load time process injection could also be launched on the web browser.  Every time a browser is executed, the malicious code will also execute within a trusted context of the browser.  If a personal firewall is monitoring for untrusted connections it is going to trust the browser. The malware will not be detected because it is part of a trusted browser.

Wardle noted that the OS X loader, which validates the digital signature of applications in the binary, could block this attack. But there are ways to work around it. The loader looks for a signature block within the binary. If it is there, it validates it. But unlike iOS, OS X allows unsigned applications to execute. So the signature block can be pulled out and the malware can “infect away,” Wardle noted.

Wardle also showed ways malware can attack dynamic libraries in OS X to allow attackers to gain persistence on vulnerable systems, perform process injection and bypass security features such as Gatekeeper.

He also shared some of the tools he has written that will help protect Macs.  KnockKnock detects what’s persistence on the Mac. It can detect launch items, kernel extension, and malware. The only limitation is it is reactive; you have to manually run it.  So, he wrote a real-time detection tool called BlockBlock.   

Another tool, TaskExplorer, looks for all running tasks and processes. “You can write filters that say show all Apple apps running or unsigned code,” he said.

Hopefully, Wardle’s attempts to show how easily more lethal malware can be written for OS X will convince Apple to up its game and security vendors to improve their products, he said.

Rutrell Yasin has more than 30 years of experience writing about the application of information technology in business and government. View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
8/26/2015 | 8:51:19 AM
Re: OS X protection vendor
On a mac, Most of the malware is installed by people who have no clue of what they're installing, especially those very well designed fake "websites" that look like a mac os X alert dialog box... It all starts with educating people on how to not fall in those dirty tricks...
User Rank: Apprentice
8/14/2015 | 7:23:54 PM
OS X protection vendor
There is a Boston based vendor called Confer that is doing a great job in detecting and preventing new unknow attacks on not only OS X but all endpoints. Anyone with an issue in this area should check them out.
COVID-19: Latest Security News & Commentary
Dark Reading Staff 7/6/2020
Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
Why Cybersecurity's Silence Matters to Black Lives
Tiffany Ricks, CEO, HacWare,  7/8/2020
Register for Dark Reading Newsletters
White Papers
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Threat from the Internetand What Your Organization Can Do About It
The Threat from the Internetand What Your Organization Can Do About It
This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2020-07-08
Buffer overflow exists in Geovision Door Access Control device family, an unauthenticated remote attacker can execute arbitrary command.
PUBLISHED: 2020-07-07
An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
PUBLISHED: 2020-07-07
Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
PUBLISHED: 2020-07-07
A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to res...
PUBLISHED: 2020-07-07
Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.